Performs bulk updates on multiple Attack discoveries, including workflow status changes and visibility settings. This endpoint allows efficient batch processing of alert modifications without requiring individual API calls for each alert. Technical preview
application/json
Body
Required
Bulk update parameters for Attack discoveries
update
objectRequired
Configuration object containing all parameters for the bulk update operation
Enables a markdown syntax used to render pivot fields, for example {{ user.name james }}. When disabled, the same example would be rendered as james. This is primarily used for Attack discovery views within Kibana. Defaults to false.
Default value is false.
ids
array[string]Required
Array of Attack discovery IDs to update
kibana_alert_workflow_status
string
When provided, update the kibana.alert.workflow_status of the attack discovery alerts
Values are open, acknowledged, or closed.
visibility
string
When provided, update the visibility of the alert, as determined by the kibana.alert.attack_discovery.users field
Values are not_shared or shared.
with_replacements
boolean
When true, returns the updated Attack discoveries with text replacements applied to the detailsMarkdown, entitySummaryMarkdown, summaryMarkdown, and title fields. This substitutes anonymized values with human-readable equivalents. Defaults to true.
Default value is true.
Responses
200
application/json
Successful response containing the updated Attack discovery alerts
Array of updated Attack discovery alert objects. Each item includes the applied modifications from the bulk update request.
An attack discovery that's also an alert (Public API with snake_case)
Hide data attributesShow data attributesobject
alert_ids
array[string]Required
The alert IDs that the attack discovery is based on
alert_rule_uuid
string
The optional kibana.alert.rule.uuid of the rule that generated this attack discovery (not applicable to ad hock runs)
alert_start
string
The optional time the attack discovery alert was created
alert_updated_at
string
The optional time the attack discovery alert was last updated
alert_updated_by_user_id
string
The optional id of the user who last updated the attack discovery alert
alert_updated_by_user_name
string
The optional username of the user who updated the attack discovery alert
alert_workflow_status
string
The optional kibana.alert.workflow_status of this attack discovery
alert_workflow_status_updated_at
string
The optional time the attack discovery alert workflow status was last updated
connector_id
stringRequired
The ID of the connector that generated the attack discovery
connector_name
stringRequired
The (human readable) name of the connector that generated the attack discovery
details_markdown
stringRequired
Details of the attack with bulleted markdown that always uses special syntax for field names and values from the source data.
entity_summary_markdown
string
An optional, short (no more than a sentence) summary of the attack discovery featuring only the host.name and user.name fields (when they are applicable), using the same syntax
generation_uuid
stringRequired
The generation ID of the run that created the attack discovery
id
stringRequired
The unique ID of the attack discovery
mitre_attack_tactics
array[string]
An optional array of MITRE ATT&CK tactic for the attack discovery
replacements
object
Replacements object used to anonymize/deanonymize messages